urn:lsid:ibm.com:blogs:entries-3404f8c4-d29c-4d8e-a7dd-f93b13530a6bMiddleware Conversations - Tags - websphere_datapower_edge_appliance The official blog of the IBM Middleware team, sharing expert opinions on the important role that middleware plays in your digital transformation.22015-07-31T16:53:27-04:00IBM Connections - Blogsurn:lsid:ibm.com:blogs:entry-95e60a7e-d135-4a33-8a69-3dda21f1d26cMost companies are overwhelmed by hackers and why a James Bond approach works.Shaku Selvakumarshakus@us.ibm.com060001XT47activeComment Entriesapplication/atom+xml;type=entryLikes2011-12-05T19:12:45-05:002011-12-05T19:12:45-05:00<div><span class="apple-style-span"><span style="font-size:11.0pt;
font-family:Arial;color:#222222;background:white">Part 2 of the</span></span><span class="apple-converted-space"><span style="font-size:11.0pt;font-family:Arial;
color:#222222;background:white">&nbsp;</span></span><i><span style="font-size:11.0pt;font-family:Arial;color:#222222;
background:white">Practical Innovation</span></i><span class="apple-style-span"><span style="font-size:11.0pt;font-family:Arial;color:#222222;background:white"><span style="float: none; ">&nbsp;series contributed by&nbsp;</span></span></span><span style="font-size: 11pt; font-family: Arial; "><a href="http://www.twitter.com/Hessel_Pijpker"><span style="color:#105CB6;background:white;text-decoration:none;
text-underline:none">Hessel Pijpker</span></a><span class="apple-style-span"><span style="color:#222222;background:white"><span style="float: none; ">, WebSphere Business Integration Tiger Team and the WebSphere
Netherlands team</span></span></span></span></div><div>&nbsp;</div><a '="" href="https://www-304.ibm.com/connections/blogs/aim/resource/BLOGS_UPLOADED_IMAGES/jamesbond.JPG
" target="_blank"><img alt="image" src="https://www-304.ibm.com/connections/blogs/aim/resource/BLOGS_UPLOADED_IMAGES/jamesbond.JPG
" style=" width:400px; display:block; margin: 1em 1em 0pt 0pt; float: left; position:relative;"></a> <div>&nbsp;</div>
<p class="MsoNormal"><b><span style="font-size:11.0pt;font-family:Arial">Fight
DDoS attacks with a ‘James-Bond’ –approach</span></b></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:Arial">The name
Anonymous appeals to the imagination. Not only does one of the best known
hacker groups carry this name, but the epithet also evokes associations of an
anonymous guerilla battle and of elusive crime. That is why the name anonymous
would not be out of place in the list of movie criminals like Jaws and
Goldfinger in the James Bond series. But the protagonist of these two ‘elusive’
bad guys is also the remedy for the hacker issues of 2011. More specifically, an
international, anonymous guerilla attack can only be fought by an international
‘MI6-approach’ with local secret agents who eliminate the dangerous cells. The
current emergency measures that companies deploy are only pretext and gives
hackers the opportunity to strike any given moment. It is time for James Bond
to save the day. <o:p></o:p></span></p>
<p class="MsoNormal"><font class="Apple-style-span" face="Arial"><span class="Apple-style-span" style="font-size: 15px; line-height: 22px; "><u><br></u></span></font></p>
<p class="MsoNormal"><b><span style="font-size:11.0pt;font-family:Arial">DDos
emergency measurements come a day after the fair<o:p></o:p></span></b></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:Arial">Breaking
into a site is outdated. Nowadays, a real hacker makes sure that the websites are
not accessible any more. Because with the so called ‘distributed denial of
service’ attacks- used for either idealistic or opportunistic reasons – a
hacker can really damage a company. The idea is simple: the hacker becomes a
stalker and sends thousands of packages. By doing so, he can effectively shut
down the target for a certain amount of time. <o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:Arial"><o:p>&nbsp;</o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:Arial">So far
nothing new, you would think, as much has been written and said about DDoS
attacks already. Therefore, it is even more striking that especially the small
companies are so surprised by such attacks. These companies are forced to use
emergency measurements, like adding extra bandwidth or asking the internet
provider to minimize the effect of the attack. Such measurements not only come
a day after the fair, they are also time-consuming, expensive and not
effective. With economic damages running into billions and reputation damage as
a result.&nbsp; <o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:Arial"><o:p>&nbsp;</o:p></span></p>
<p class="MsoNormal"><b><span style="font-size:11.0pt;font-family:Arial">The
James Bond-strategy: beat hackers with their own strategy<o:p></o:p></span></b></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:Arial">Beating
DDoS attacks is not simple. The problem lies in the fact that the packages are
not sent from one location, but from thousands of different infected computers
that are also spread all over the world. This makes it very complicated to
resist the attack and to trace the hackers. <o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:Arial"><o:p>&nbsp;</o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:Arial">Companies
do not realize that traditional system protection cannot deal with the
distributed character of these attacks. The attacks are performed by thousands
of local ‘cells’ that are difficult to eliminate from one central point. To
successfully eliminate these refined and almost elusive cells, you have to use
the same strategy as the hackers: mobilize thousands of local ‘James-Bond’
agents who can timely eliminate thousands of criminal cells. To achieve this,
you should start with creating an architectonic strong network in which these
agents can operate. Such a network immediately sees where the attacks are
performed, and can subsequently strike back with a flexible and adequate
counterattack. No, don’t be shocked: this kind of system does not exist out of
physical persons who globally work together. The ‘virtual’ Akamai network (you
could say the MI6 against hackers) is designed in such a way that the
DDoS-attacks are already eliminated by local ‘agents’, instantly capturing the
high amount of service requests. This enables fast en reliable services to end
users at all times. This way, systems will not be attacked anymore by the
numerous ‘request’ packages: the MI6 network absorbs the request packages or
deflects them. The Akamai network of thousands of servers in more than 1000
data centers is a MI6 system that offers the capacity to locally absorb such
attacks. Also Q has a part: encoded identification mechanisms and communication
methods between headquarter and the secret agents ensure a perfect security. <o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:Arial"><o:p>&nbsp;</o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:Arial">In the year
2011 a company cannot afford to be lured &nbsp;into a ‘DDoS’- attack. This reflects the same
naivety as people who click on malware, because they believe they have won the
lottery. Do not fight the DDoS attacks any longer with emergency measurements
but invest in a MI6-system that tackles the problem by its roots. <o:p></o:p></span></p>
<div>&nbsp;</div><p class="MsoNormal"><font class="Apple-style-span" face="Arial"><span class="Apple-style-span" style="font-size: 15px; line-height: 22px;">Want more information?</span></font></p>
<p class="MsoNormal"><span style="font-size: 11pt; font-family: Arial; ">The
<b>WebSphere Application Acceleration</b> products offer best-in-class Internet
application delivery technologies with best-in-class enterprise infrastructure
appliances from IBM. These solutions provide end-to-end optimization,
acceleration, security and management from the enterprise through the Internet
to the end-user and back.<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size: 11pt; font-family: Arial; ">IBM
offers a full set of application acceleration solutions that help you simplify
your environment, while delivering applications fast and securely to end-users
around the globe so that you can focus on building the applications that add
value to your business.</span></p>
<p class="MsoNormal"><span style="font-size: 11pt; font-family: Arial; "><b>Application
optimization</b> - Improve performance and scalability of web-based applications
with optimized mission critical traffic
http://www-01.ibm.com/software/websphere/products/application-infrastructure/application-optimization/&nbsp;</span></p>
<p class="MsoNormal"><span style="font-size: 11pt; font-family: Arial; "><b>WebSphere
Application Accelerator for Public Networks</b> - An Akamai and IBM Collaborative
solution providing performance and security
http://www-01.ibm.com/software/webservers/application-accelerator-for-public-networks/&nbsp;</span></p>
<p class="MsoNormal"><span style="font-size: 11pt; font-family: Arial; "><b>WebSphere
DataPower Edge Appliance XE82</b> - Integrates edge-of-network, traffic gateway
functions, including multiple authentication and authorization mechanisms
http://www-01.ibm.com/software/webservers/appserv/xe82/ &nbsp;</span></p><div>&nbsp;</div><a '="" href="http://www.ibm.com/impact" target="_blank"><img alt="image" src="http://www.ibm.com/impact" style=" width:200px; display:block; margin: 0 auto;text-align: center; position:relative;"></a> <div>&nbsp;</div><p class="MsoNormal"><span style="font-size: 11pt; font-family: Arial; ">Want to learn more? &nbsp;Attend Impact 2012, the premier conference for IT and Business Leaders. Meet and network with experts, IT and business leaders. Register&nbsp;</span><a href="http://www.ibm.com/impact">here</a></p><div><span class="Apple-style-span" style="font-family: Arial; font-size: 15px; line-height: 22px; ">Follow @ibmimpact #ibmimpact and join the&nbsp;</span><a href="http://www.ibm.com/social/aggregator/impact">Impact Conversations</a></div><div>&nbsp;</div>Part 2 of the &nbsp; Practical Innovation &nbsp;series contributed by&nbsp; Hessel Pijpker , WebSphere Business Integration Tiger Team and the WebSphere
Netherlands team &nbsp; &nbsp;
Fight
DDoS attacks with a ‘James-Bond’ –approach
The...007335urn:lsid:ibm.com:blogs:entries-3404f8c4-d29c-4d8e-a7dd-f93b13530a6bMiddleware Conversations2015-07-31T16:53:27-04:00urn:lsid:ibm.com:blogs:entry-0f48ed4f-5cb5-41df-b411-c97234eca20eThe world continues while our internet is at a standstillShaku Selvakumarshakus@us.ibm.com060001XT47activeComment Entriesapplication/atom+xml;type=entryLikes2011-10-24T18:28:18-04:002011-10-25T12:11:09-04:00<div>This Part 1 of the <i>Practical Innovation</i>&nbsp;series contributed by&nbsp;<a href="http://www.twitter.com/Hessel_Pijpker">Hessel Pijpker</a>, WebSphere Business Integration Tiger Team and the WebSphere Netherlands team</div><div>&nbsp;</div><div><b>A response time of 10 seconds is 10 too many!</b></div><div>&nbsp;</div><div><a href="https://www-304.ibm.com/connections/blogs/aim/resource/BLOGS_UPLOADED_IMAGES/iStock_000012990898XSmall.JPG" target="_blank"><img alt="image" src="https://www-304.ibm.com/connections/blogs/aim/resource/BLOGS_UPLOADED_IMAGES/iStock_000012990898XSmall.JPG" style=" width:200px; display:block; margin: 1em 1em 0pt 0pt; float: left; position:relative;"></a> It actually is a strange phenomenon: we never cease to complain about the delays of our public transport, but we accept our daily digital delays as a necessary evil. &nbsp;Dawdling and procrastination are not tolerated in our 24 hour economy. &nbsp;Shouldn't we have the same attitude when it concerns our internet use for business related issues?</div><div>&nbsp;</div><div><b>No time to lose...only behind our computer screen&nbsp;</b></div><div>&nbsp;</div><div>It seems to be a paradox. &nbsp;We do not have a second to lose and we are always in a rush. &nbsp;We invent creative ways to save time and complain when there is a hold up. &nbsp;Time is money and every second counts. &nbsp;However, this all ends the moment we settle down behind our laptops, pc or tablet. &nbsp;This is when the biggest delay of our working day usually starts. &nbsp;However, we are not aware of this. &nbsp;Only during video calls, this delay becomes visible. &nbsp;For example when a colleague on the other side of the world answers your urgent question in slow motion. &nbsp;The problems are less visible when someone tries to log on to systems that malfunction because there is no 'realtime' connection. &nbsp;Usually we see these kinds of malfunctions as inevitable. &nbsp;</div><div>&nbsp;</div><div>You might think I am exaggerating, because employers actually do invest money in ICT solutions. &nbsp;However, few companies realize that problems should not be resolved afterwards, but that they should invest in making internet processes available <b>realtime. &nbsp; </b>This happens insufficiently, while organizations and companies do use the internet to support internal processes. &nbsp;Take any international company: &nbsp;the CRM system can be located in America, but everyone around the world should be able to use it 24/7. &nbsp;A response time of 10 seconds is in this case not unusual. &nbsp;Yet this is still 10 seconds too many. &nbsp;It is already possible to reduce this time to 3 seconds, and in the future it will be even less.</div><div>&nbsp;</div><div><b>Delayed communication is outdated communication&nbsp;</b></div><div>&nbsp;</div><div>A high response time is for different reasons disadvantageous for a company. &nbsp;Not only does it lower the productivity of employees significantly, it also chases consumers away from buying products. &nbsp;Time is important for consumers: when they are confronted with protracted online service, they are prone to go to another site.&nbsp;</div><div>&nbsp;</div><div>While larger companies do make the investment to solve existing problems, most smaller companies have not yet taken this step. &nbsp;Many of the companies think they are a front runner with their internet activities. &nbsp;But in fact, they are just as delayed as their internet traffic. &nbsp;A few years ago E-commerce on its own was innovative. &nbsp;Today we need to be innovative around how we retain the attention of our customers by accelerating internet processes. &nbsp;Smaller companies also need to undergo a strategic shift to prioritize acceleration. &nbsp;To achieve this, they need to invest in software, hardware and network capacity. &nbsp;The investment in real time connections is indeed affordable for small companies because they do not pay a lump sum, but a per use rate. &nbsp;The investment pays dividends in different ways. &nbsp;A real time connection enhances the productivity of employees, but also customer satisfaction and sales progression. Time is money, also for business internet usage.</div><div>&nbsp;</div><div>Interested in accelerating your Internet application delivery?</div><div>The WebSphere Application Acceleration products offer best-in-class Internet application delivery technologies with best in class enterprise infrastructure appliances from IBM. &nbsp;These solutions provide end-to-end optimization, acceleration, security and management from the enterprise through the Internet to the end-user and back.</div><div>&nbsp;</div><div>IBM offers a full set of application acceleration solutions that help you simplify your environment, while delivering applications fast and securely to end-users around the globe so that you can focus on building the applications that add value to your business.</div><div>&nbsp;</div><div>Application optimization -&nbsp;<a href="/software/websphere/products/application-infrastructure/application-optimization/">Improve performance and&nbsp;scale ability of web-based applications with optimized mission critical traffic&nbsp;</a></div><div><a href="/software/webservers/application-accelerator-for-public-networks/">WebSphere Application Accelerator for Public Networks</a>&nbsp;- An Akamai and IBM collaborative solution providing performance and security</div><div><a href="/software/webservers/appserv/xe82/">WebSphere DataPower Edge Appliance XE82</a>&nbsp;- Integrates edge-of-network, traffic gateway functions, including multiple authentication and authorization mechanisms&nbsp;</div>
<p class="MsoNormal"><span class="Apple-style-span" style="font-size: 15px; line-height: 22px; "><b><a href="https://www-304.ibm.com/connections/blogs/aim/resource/BLOGS_UPLOADED_IMAGES/500x140_bizagility_ogilvy.JPG" target="_blank"><img alt="image" src="https://www-304.ibm.com/connections/blogs/aim/resource/BLOGS_UPLOADED_IMAGES/500x140_bizagility_ogilvy.JPG" style=" display:block; margin: 0 auto;text-align: center; position:relative;"></a></b></span></p><div>&nbsp;</div><div style="text-align: left;"><u>Additional resources&nbsp;</u></div><span class="Apple-style-span" style="color: rgb(34, 34, 34); background-color: rgb(255, 255, 255); "><ul style="margin-top: 0pt; margin-right: 0pt; margin-bottom: 0pt; margin-left: 0pt; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 40px; font-style: inherit; font-size: 12px; list-style-type: disc; "><li style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-style: inherit; font-size: 12px; overflow-x: visible; overflow-y: visible; ">Visit the&nbsp;<a href="https://www.ibm.com/connections/blogs/roller-ui/authoring/www.ibm.com/business-agility" style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-style: inherit; font-size: 12px; text-decoration: none; color: rgb(16, 92, 182); ">Business Agility website</a></li><li style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-style: inherit; font-size: 12px; overflow-x: visible; overflow-y: visible; "><a href="http://www.ibm.com/software/solutions/business-agility/events.html" style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-style: inherit; font-size: 12px; text-decoration: none; color: rgb(16, 92, 182); ">Attend IBM Business Agility Executive Forums</a>&nbsp;Around the World</li><li style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-style: inherit; font-size: 12px; overflow-x: visible; overflow-y: visible; ">Follow us:&nbsp;<a href="http://twitter.com/#%21/ibmbizagility" style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-style: inherit; font-size: 12px; text-decoration: none; color: rgb(16, 92, 182); ">@ibmbizagility</a>&nbsp;Hashtag:&nbsp;<a href="http://twitter.com/#%21/search/%23bizagility" style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-style: inherit; font-size: 12px; text-decoration: none; color: rgb(16, 92, 182); ">#bizagility</a></li><li style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-style: inherit; font-size: 12px; overflow-x: visible; overflow-y: visible; "><a href="https://www-.ibm.com/social/aggregator/software" style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-style: inherit; font-size: 12px; text-decoration: none; color: rgb(16, 92, 182); ">Join the conversation</a>&nbsp;on Business Agility on IBM Software</li><li style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-style: inherit; font-size: 12px; overflow-x: visible; overflow-y: visible; ">Discuss with peers:&nbsp;<a href="http://www.linkedin.com/groups?gid=1798743&amp;trk=anetsrch_name&amp;goback=%2Egdr_1267473556058_1" style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-style: inherit; font-size: 12px; text-decoration: none; color: rgb(16, 92, 182); ">Business Agility LinkedIn Group</a></li></ul></span><p>
</p>
This Part 1 of the Practical Innovation &nbsp;series contributed by&nbsp; Hessel Pijpker , WebSphere Business Integration Tiger Team and the WebSphere Netherlands team &nbsp; A response time of 10 seconds is 10 too many! &nbsp; It actually is a strange...003759urn:lsid:ibm.com:blogs:entries-3404f8c4-d29c-4d8e-a7dd-f93b13530a6bMiddleware Conversations2015-07-31T16:53:27-04:00